1. Trang chủ
  2. » Mẫu Slide

11 information security management

32 9 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Information Security Management
Người hướng dẫn Nga Lê Thị Quỳnh
Trường học University Of Economics Ho Chi Minh City
Chuyên ngành Information Security Management
Thể loại Lecture
Năm xuất bản 2024
Thành phố Ho Chi Minh City
Định dạng
Số trang 32
Dung lượng 1,22 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Threats to information security Types of Security Problems?. Threats to information security • Denial-of-service attacks intentional... Threats to information security - Loss of Infrast

Trang 1

Lecture 11: Information Security

Management Nga.lethiquynh@ueh.edu.vn http://mis.ueh.edu.vn/blog/

Trang 2

Q4 What data safeguards are available?

Q5 What human safeguards are available?

Q6 How should organizations respond to

security Incidents?

Trang 3

Q1: What are the threats

to information security?

Trang 4

Threats to information security

Sources of Threats?

 human error and mistakes:

 accidental problems caused by both employees and nonemployees

 poorly written application programs and poorly designed procedures

 physical accidents

 malicious human activity

 employees and former employees who intentionally destroy data

 Hackers

 natural events and disasters

 fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature

Trang 5

Threats to information security

Types of Security Problems?

Source: Textbook [1], page 409

Trang 6

Unauthorized Data Disclosure

 Pretexting: when someone deceives by pretending to be

someone else

 Phishing: uses pretexting via email

 Spoofing: another term for someone pretending to be someone else

 IP spoofing: occurs when an intruder uses another site’s IP address as

if it were that other site

 Email spoofing: a synonym for phishing

 Drive-by sniffers: take computers with wireless connections through an area and search for unprotected wireless networks

Threats to information security

Trang 7

Incorrect Data Modification

 Procedures incorrectly designed or not followed

 Increasing a customer’s discount or incorrectly modifying employee’s salary

 Placing incorrect data on company the Web site

 Improper internal controls on systems

 System errors

 Faulty recovery actions after a disaster

Threats to information security

Trang 8

Threats to information security

• Denial-of-service attacks (intentional)

Trang 9

Threats to information security - Loss of

Infrastructure

• Human accidents.

• Theft and terrorist events.

• Disgruntled or terminated employee.

• Natural disasters.

Advanced Persistent Threat (APT)

 Sophisticated, possibly long-running

computer hack perpetrated by large,

well-funded organizations

Trang 10

What Are the Components of an

Organization’s Security Program?

 3 components

 senior-management involvement

 establish the security policy

 manage risk by balancing the costs and benefits

of the security program

 Safeguards: protections against security

threats

 organization’s planned response to security

incidents

Trang 11

Security Safeguards

Source: Textbook [1], page 411

Trang 12

Q2: What is senior

management’s security role?

Trang 13

Senior management’s security role

 What sensitive data the organization will store.

 How it will process that data.

 Whether data will be shared with other

organizations.

 How employees and others can obtain copies of data

stored about them.

 How employees and others can request changes to

inaccurate data.

 What employees can do with their own mobile

devices at work

 …

Trang 14

 determine what safeguards

Risk-Management Decisions : decide what to do

Risk Assessment Factors Source: textbook [1], page 415

Senior management’s security role

Trang 15

Q3 What technical

safeguards are available?

Trang 16

Technical safeguards

Source: Textbook [1], page 418

Trang 17

Essence of https (SSL or TLS)

Source: Textbook [1], page 422

Trang 18

Digital Signatures

Source: Textbook [1], page 423

Trang 19

Malware Protection

replicates itself

Trojan horses are viruses that masquerade

as useful programs or files

the Internet or other computer network

Spyware programs are installed on the

user’s computer without the user’s

Trang 20

Malware Protection

1. Antivirus and antispyware programs.

2. Scan frequently.

3. Update malware definitions.

4. Open email attachments only from

known sources.

5. Install software updates.

6. Browse only reputable Internet

neighborhoods.

Trang 21

Q4 What data safeguards

are available?

Trang 22

Data safeguards

Source: Textbook [1], page 427

Trang 23

Q5 What human

safeguards are available?

Trang 24

Human safeguards

Source: Textbook [1], page 429

Trang 25

Account Administration

Account Management

➢ Standards for new user accounts,

modification of account permissions, and

removal of accounts that are not needed

Trang 26

Sample Account Acknowledgment

Form

Source: Textbook [1], page 431

Trang 27

Systems Procedures

Source: Textbook [1], page 432

Trang 28

Q6 How should organizations

respond to security Incidents?

Trang 29

How should organizations respond to

security Incidents?

Source: Textbook [1], page 435

Trang 30

Q4 What data safeguards are available?

Q5 What human safeguards are available?

Q6 How should organizations respond to

security Incidents?

Trang 31

Additional Resources

 2017-Ransomeware ‘WannaCry’ attack

explained

 2017-Impact of WannaCry

Ngày đăng: 15/12/2023, 14:44

🧩 Sản phẩm bạn có thể quan tâm

w